Chapter 5: Information Security: Protecting Information and Resources Flashcards

1
Q

Information Security

A

protect organization data and IS from unauthorized access and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Costs of Information Security Breaches

A

stolen work, blackmail, money, damage to company property, clients and reputation, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triangle

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

prevent disclosing information to anyone who is not authorized to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

accuracy and reliability of information resources within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability (3)

A

-computers and networks are operational
- users can obtain information required
- quick recovery in event of failure or disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

McCumber Cube and sides

A

3 dimensional cube to bring goals together
Side 1: Transmission, Storage, Processing
Side 2: Confidentially, Integrity, Availability
Slide 3. Human Factors, Privacy and Practice, Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats: Spyware

A

software secretly gathers info about users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats: Adware

A

Form of spyware, collects info about user to displays ads in web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats: Phishing

A

Sending fraudulent emails appearing from legitimate sources. Not directed like spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threats: Pharming

A

hijack IP address of a website etc users who enter website are directed to fraudulent website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threats: Spear Phishing

A

target email scan with sole purpose of obtaining sensitive data from company, person or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats: Baiting & Quid Pro Quo

A

get someone to fall for something out of their own curiosity or fear, cyber actors offer them something in return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keystroke Loggers
what are they
what can they be used for (3)

A

monitor and record keystrokes
1. track employees computer use
2. Malicious purposes
3. prevent antivirus and anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats: Sniffing

A

hackers capture and record network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threats: Spoofing

A

gain access to network by posing as an authorized user, disguise their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threats: Virus

A

self-propagating program code and attaches itself to many files and will cycle when program is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threats: Worm

A

virus or program that can independently spread without being attached to host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threats: Trojan Programming

A

A code that is intended to disrupt a computer, network or website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Threats: Logic Bomb

A

Type of trojan program, release destructive worm or code

21
Q

Threats: Backdoor

A

designer can bypass security and sneak back into system to access program or files

22
Q

Threats: Blended Threat

A

Public and private networks, combine threats, virus, worms and codes to evade

23
Q

RAM Scraping

A

Scans RAM (memory) to find sensitive saved data

24
Q

Credentialing

A

stealing passwords, logins

25
Q

USB Worms

A

Viruses stored on USB device

26
Q

Cryptojacking

A

Harnessing loose computing program to mine cryptocurrency

27
Q

Social Engineering

A

use peoples skills to trick others into revealing private information to break into networks and servers

28
Q

Denial of Service Attack (DoS)

A

Floods a network with service requests to prevent legitimate user’s access to the system

29
Q

Distributed Denial of Service Attack (DDoS)

A

thousands of computer work together to bombard a website with thousands of requests causing it to halt

30
Q

Telephony Denial of Service (TDoS)

A

high volumes of automated calls to tie up a target phone system, company comes to a halt

31
Q

Types of Hackers and description (3)

A

Script Kiddies: Use for malicious intent but not as skilled
Black Hats: Typical Hacker
White Hacker: Ethical hacker given permission to determine vulnerability of the software/network

32
Q

Defence: First Step to Comprehensive Security System
Fault-Tolerant Systems and examples (3)

A

Ensure availability in event of a system failure by using hardware and software
- Uninterruptible Power Supply (UPS)
- Redundant Array of Independent Disks (RAID)
- Mirror Disk

33
Q

Defence: Access Controls

A

Designed to protect system from unauthorized access

34
Q

Biometric Security Measures and examples

A

Physiological element unique to person which cannot be stolen or copied

35
Q

Non Biometric Measures: Callback Moderns

A

Log user off and call back at predetermined number (working from home)

36
Q

Non Biometric Measures: Terminal Resource Security

A

erases the screen and signs user off automatically after a length of inactivity

37
Q

Non Biometric Measures: Intrusion Detect System

A

protect against internal and external acess

38
Q

Non Biometric Measures: Password

A

a login credential made up of text, keys, symbols and characters

39
Q

Physical Security measures: (4)

A

cable shielding
electronic tracker
steel encasements
ID Badges

40
Q

Firewalls and what does it decide?

A

soft/hardware barrier between private network and external computer or network

decides whether to allow transmission of data

41
Q

Firewall Actions (4)

A

reject, report, reply, accept,

42
Q

Types of Firewall: Packet-filtering firewall

A

examines every packet passing in/out of network

43
Q

Types of Firewall: Application-filtering firewall

A

controls use of applications like email

44
Q

Types of Firewall: Proxy Server

A

intermediary between two systems

45
Q

Virtual Private Network (VPN)

A

secure tunnel through the internet to transmit messages, information and data etc WawanesaLife VPN

46
Q

Data Encryption

A

Transform Data (plaintext) to scrambled form (ciphertext)

47
Q

Encryption Protocols (3)

A
  1. Manage encryption and security over internet
  2. secure socket layers
  3. Transport Layer Security
48
Q

Types of Encryption: 2

A

Public Key Infrastructure: Asymmetric Equation
Secret Key Encryption: Symmetric Equation